Skip to main content

An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage

  • Conference paper
  • First Online:
  • 530 Accesses

Abstract

The Attribute Based Encryption (ABE) algorithm can be used to realize fine grained access control for the mobile cloud storage. In ABE, the decryption algorithm has high complexity and the rank revocation is difficult to be implemented. An ABE middleware with rank revocation is given in this paper. The ABE middleware delegate the ABE decryption operation for the resource constrained mobile device. The attribute authority can revoke the user’s rank through this middleware instantly with fine-grained control and the revocation process may not affect any other users. The ABE middleware is implemented and experiment results show that the ABE middleware improves ABE decryption performance about 30 times.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The 34th accounting reports of the development situation of China Internet. China Internet, vol. 7 (2014)

    Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  3. Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  4. Horváth, M.: Attribute-based encryption optimized for cloud computing. In: Italiano, G.F., Margaria-Steffen, T., Pokorný, J., Quisquater, J.-J., Wattenhofer, R. (eds.) SOFSEM 2015. LNCS, vol. 8939, pp. 566–577. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46078-8_47

    Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, pp. 321–334 (2007)

    Google Scholar 

  6. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  7. Wang, Y.D., Yang, J.H., Xu, C., Ling, X., Yang, Y.: Survey on access control technologies for cloud computing. Ruan Jian Xue Bao/J. Softw. 26(5), 1129–1150 (2015)

    MathSciNet  Google Scholar 

  8. Su, J.S., Cao, D., Wang, X.F., Sun, Y.P., Hu, Q.L.: Attribute-based encryption schemes. J. Softw. 22(6), 1299–1315 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  9. Pirretti, M., Traynor, P., Mcdaniel, P., et al.: Secure attribute-based systems, pp. 99–112 (2006)

    Google Scholar 

  10. Asim, M., Ibraimi, L., Petković, M.: Ciphertext-policy attribute-based broadcast encryption scheme. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 244–246. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24712-5_25

    Chapter  Google Scholar 

  11. Wang, P.P., Feng, D.G., Zhang, L.W.: CP-ABE scheme supporting fully fine-grained attribute revocation. J. Softw. 23(10), 2805–2816 (2012)

    Article  MathSciNet  Google Scholar 

  12. Belqasmi, F., Glitho, R., Fu, C.: RESTful web services for service provisioning in next-generation networks: a survey. IEEE Commun. Mag. 49(12), 66–73 (2011)

    Article  Google Scholar 

  13. Belqasmi, F., Singh, J., Bani Melhem, S.Y., et al.: SOAP-based vs. RESTful web services: a case study for multimedia conferencing. IEEE Int. Comput. 16(4), 54–63 (2012)

    Article  Google Scholar 

  14. Li, Y., Zeng, Z.Y., Zhang, X.F.: Outsourced decryption scheme supporting attribute revocation. J. Tsinghua Univ. (Sci. Technol.) 12, 1664–1669 (2013)

    Google Scholar 

Download references

Acknowledgment

This work was partly supported by the National Natural Science Foundation of China (61661015), Ministry of Education Key Lab of Cognitive Radio and Information Processing Found (CRKL160101), Guangxi Collaborative Innovation Center of Cloud Computing and Big Data Found (YD16801), Guangxi Scientific and technological plan (1598008-28), High Level of Innovation Team of Colleges and Universities in Guangxi Outstanding Scholars Program Funding, and GUET Cloud Security and Cloud Service Innovation Group Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qian He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dong, Q., He, Q., Cai, M., Liu, P. (2018). An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage. In: Huang, M., Zhang, Y., Jing, W., Mehmood, A. (eds) Wireless Internet. WICON 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 214. Springer, Cham. https://doi.org/10.1007/978-3-319-72998-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72998-5_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72997-8

  • Online ISBN: 978-3-319-72998-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics